SlideShare a Scribd company logo
1 of 30
IN DEFENCE OF THE
HUMAN FACTOR
Dr Ciarán Mc Mahon
Tivi Digital & Cyber Security,
Scandic Park, Helsinki,
24.11.2016
Introduction
• Today’s talk
• The so-called ‘weakest’ so-called ‘link’
• The ETTO principle
• Everything is broken
• Victim-blaming
• Building a positive cyber security culture
About me
Dr Ciarán Mc Mahon is a director of the Institute of Cyber
Security and an award-winning academic psychologist from
Ireland. A former Government of Ireland Scholar, he has
published research on the history of psychological language,
the psychology of social media, digital wellness and the social
impact of cybercrime. Ciarán has worked at a number of third
level institutions, and is currently an occasional lecturer at
University College Dublin. Ciarán also has extensive media
experience and regularly contributes on topics relating to the
human aspects of information technology to national and
international outlets including Sky News, BBC Radio London,
USA Today, Fortune Magazine, and The Guardian.
The Institute of Cyber Security aims to help
companies and organisations develop the most
resilient cyber security culture possible.
It all started with Bruce Schneier (2000)
It all started with Bruce Schneier (2000)
and continued with Kevin Mitnick (2002)
and continued with Kevin Mitnick (2002)
AS A HUMAN BEING,
I RESENT THIS!
What about the other links
in the security chain?
Are they really stronger, and more secure?
‘Everything is broken’
Quinn Norton
It’s hard to explain to regular people
how much technology barely works,
how much the infrastructure of our lives
is held together by the IT equivalent of
baling wire.
Computers, and computing, are broken.
Update of the art
Recent patches
o 16 updates of iOS in the last year
o 3 Flash updates in a single month
o How quickly did Windows 8 become
Windows 8.1?
Update of the art
Recent patches
o Only 7.5% of all Android devices are
running its most secure operating system
o This is currently being investigated by
the US Federal Trade Commission
‘Another flaw in the human character is that
everybody wants to build and nobody wants to do
maintenance’
So why are we blaming people for security
problems, when the technology is falling apart?
Acceptable accident causes (Hollnagel & Amalberti,
2001)
Accidents are always found to have
been
o associated with a system structure
o which can be reduced within accepted
limits of cost and time
o conforms to current “norms” for
explanations
Human error is a meaningless concept
Every day the average office worker clicks on hundreds of hyperlinks as
part of their job. But one day, they click on the wrong one, and suddenly
they’re the cause of malware infection.
Hollnagel’s (2006) ETTO principle – ‘efficiency-thoroughness trade-off’
Sometimes things go wrong, sometimes things go right.
The flipside
o We say that ‘the human factor is the weakest link in
cybersecurity’ because it’s a lot easier than tackling the real
problem
o the fact that IT is falling apart
o But that’s not the only reason we shouldn’t say ‘the human
factor is the weakest link in cybersecurity’
IBM 2015 Cyber Security Intelligence Index
But how can you expect your employees to
listen to you when you are assume that they
are stupid or untrustworthy?
But how can you expect your employees to
listen to you when you are assume that they
are stupid or untrustworthy?
WE NEED TO CHANGE HOW WE TALK ABOUT
HUMAN FACTORS IN CYBERSECURITY
Victim blaming (Cross, 2015)
Discourse on online fraud is based on
idea of greedy/gullible victims
o does not take into account level of
deception and sophisticated targeting
o humour isolates victims and impacts
their ability to warn others
Understanding abusive insiders
Posey, Bennett, & Roberts (2011) :
o employees who do not feel that their
organisations trust them will engage in
more computer abuse when security
measures are brought in
Organisational justice and fairness
Bulgurcu, Cavusoglu, & Benbasat
(2009):
o creating a fair environment and
ensuring procedural justice in regards
to implementing security rules and
regulations is the key to effective
information security management.
Are CISOs their own worst enemy?
(Ashenden & Sasse, 2013)
CISOs struggle to gain credibility due
to:
o confusion about their role identity
o inability to engage effectively with
employees
If we want our colleagues, co-workers and corporate level
executives to engage with cybersecurity policy, we have to
stop seeing them as the weakest link. We have to start
engaging with them, trusting them, and educating them.
It’s that simple.
Thank you.
Email info@instituteofcybersecurity.com
Phone(IRE) +353 1 5137093
Phone(UK) +44 203 8085226
Address Unit 1, 77 Sir John Rogerson’s Quay,
Dublin 2, Ireland
For full report, contact ciaran@instituteofcybersecurity.com
Studies cited
Ashenden, D., & Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy? Computers and Security, 39, 396–405.
http://doi.org/10.1016/j.cose.2013.09.004
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2009). Roles of information security awareness and perceived fairness in information security
policy compliance. 15th Americas Conference on Information Systems 2009, AMCIS 2009, 5, 3269–3277.
Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204.
http://doi.org/10.1177/0269758015571471
Hollnagel, E. (2009). The ETTO Principle: Why things that go right sometimes go wrong. Farnham, UK: Ashgate.
Hollnagel, E., & Amalberti, R. (2001). The emperor’s new clothes: Or whatever happened to “human error”? 4th International Workshop on
Human Error, Safety and Systems Development, (April), 1–18.
Mitnick, K. D., & Simon, W. L. (2002). The art of deception: Controlling the human element of security. Indianapolis, IN: John Wiley & Sons
Posey, C., Bennett, R. J., & Roberts, T. L. (2011). Understanding the mindset of the abusive insider: An examination of insiders’ causal
reasoning following internal security changes. Computers and Security, 30(6-7), 486–497. http://doi.org/10.1016/j.cose.2011.05.002
Other sources
Goodin, D. (2016, May 10). Feds probe mobile phone industry over the sad state of security updates. Ars Technica
http://arstechnica.com/security/2016/05/feds-probe-mobile-industrys-security-update-practices/
IBM (2015). IBM 2015 Cyber Security Intelligence Index. http://www-01.ibm.com/common/ssi/cgi-
bin/ssialias?subtype=WH&infotype=SA&htmlfid=SEW03073USEN&attachment=SEW03073USEN.PDF
Lonergan, K. (2015, June 30). The human factor: top tips to strengthen the weakest link in the information security chain. http://www.information-
age.com/technology/security/123459735/human-factor-top-tips-strengthen-weakest-link-information-security-chain
Meetup.com (2016, April 7). Human Factors in (Cyber) Security: Exploiting the Weakest Link? http://www.meetup.com/French-IT-Group-
Australia-Asia/events/230137510/
Norton, Q. (2014, May 20). 'Everything is broken'. The Message (Medium). https://medium.com/message/everything-is-broken-
81e5f33a24e1#.sc7pf19g3
SANS Institute (2001). The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem.
https://www.sans.org/reading-room/whitepapers/vpns/weakest-link-human-factor-lessons-learned-german-wwii-enigma-cryptosystem-
738
Schneier, B. (2000). Secrets and lies: Digital security in a networked world. New York: John Wiley & Sons.
Singer, P.W. & Friedman, A. (2014). Cybersecurity: What Everyone Needs to Know. Oxford: OUP.
https://books.google.ie/books?id=9VDSAQAAQBAJ&dq
Vishwanath, A. (2016, May 5). Cybersecurity’s weakest link: humans. The Conversation. https://theconversation.com/cybersecuritys-weakest-
link-humans-57455
Wright, A. (2016, April 13). Humans in cyber security – the weakest link. https://www.itgovernance.co.uk/blog/humans-in-cyber-security-the-
weakest-link/

More Related Content

What's hot

Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social InfluencesCori Faklaris
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationcentrelink
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber RiskCapitolTechU
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionCori Faklaris
 
Gender and the digital divide
Gender and the digital divideGender and the digital divide
Gender and the digital dividelinakap3
 
How Young is Too Young?
How Young is Too Young? How Young is Too Young?
How Young is Too Young? sshrimali
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5lisamulka
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Saptarshi Ghosh
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperMeghan.V
 
Major assignment - Impact of Social Technologies on Society
Major assignment - Impact of Social Technologies on SocietyMajor assignment - Impact of Social Technologies on Society
Major assignment - Impact of Social Technologies on SocietyHarris Naseem
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2groot83
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebookhernan_j1
 
how does technology affect society?
how does technology affect society?how does technology affect society?
how does technology affect society?kahooks324
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyAditya
 
Decline of interpersonal communication
Decline of interpersonal communicationDecline of interpersonal communication
Decline of interpersonal communicationNaeemMushtaq4
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
Media assignment
Media assignmentMedia assignment
Media assignmentairwin3
 

What's hot (18)

Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social Influences
 
Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber Risk
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Gender and the digital divide
Gender and the digital divideGender and the digital divide
Gender and the digital divide
 
How Young is Too Young?
How Young is Too Young? How Young is Too Young?
How Young is Too Young?
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
 
Major assignment - Impact of Social Technologies on Society
Major assignment - Impact of Social Technologies on SocietyMajor assignment - Impact of Social Technologies on Society
Major assignment - Impact of Social Technologies on Society
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebook
 
how does technology affect society?
how does technology affect society?how does technology affect society?
how does technology affect society?
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
Decline of interpersonal communication
Decline of interpersonal communicationDecline of interpersonal communication
Decline of interpersonal communication
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Media assignment
Media assignmentMedia assignment
Media assignment
 

Viewers also liked

Mc Mahon, C. (2011). Social media usage by candidates in the 2011 Irish Gener...
Mc Mahon, C. (2011). Social media usage by candidates in the 2011 Irish Gener...Mc Mahon, C. (2011). Social media usage by candidates in the 2011 Irish Gener...
Mc Mahon, C. (2011). Social media usage by candidates in the 2011 Irish Gener...Tally Book
 
Prof. DiAfonso - Elementos da Comunicação e Funções da Linguagem - Questões
Prof. DiAfonso  -  Elementos da Comunicação e Funções da Linguagem - QuestõesProf. DiAfonso  -  Elementos da Comunicação e Funções da Linguagem - Questões
Prof. DiAfonso - Elementos da Comunicação e Funções da Linguagem - QuestõesDiógenes de Oliveira
 
Visualizing the Area of a Trapezoid Formula - Deriving the Algebraic Formula
Visualizing the Area of a Trapezoid Formula - Deriving the Algebraic FormulaVisualizing the Area of a Trapezoid Formula - Deriving the Algebraic Formula
Visualizing the Area of a Trapezoid Formula - Deriving the Algebraic FormulaKyle Pearce
 
Augmented Reality: Beyond Usability
Augmented Reality: Beyond UsabilityAugmented Reality: Beyond Usability
Augmented Reality: Beyond UsabilityPamela Rutledge
 
The Transmedia Trip: The Psychology of Multi-Platform Engagement
The Transmedia Trip: The Psychology of Multi-Platform EngagementThe Transmedia Trip: The Psychology of Multi-Platform Engagement
The Transmedia Trip: The Psychology of Multi-Platform EngagementPamela Rutledge
 
Transmedia Storytelling for Social Impact
Transmedia Storytelling for Social ImpactTransmedia Storytelling for Social Impact
Transmedia Storytelling for Social ImpactPamela Rutledge
 
The Psychology of Social Media (Mozcon 2015)
The Psychology of Social Media (Mozcon 2015)The Psychology of Social Media (Mozcon 2015)
The Psychology of Social Media (Mozcon 2015)Buffer
 

Viewers also liked (8)

Mc Mahon, C. (2011). Social media usage by candidates in the 2011 Irish Gener...
Mc Mahon, C. (2011). Social media usage by candidates in the 2011 Irish Gener...Mc Mahon, C. (2011). Social media usage by candidates in the 2011 Irish Gener...
Mc Mahon, C. (2011). Social media usage by candidates in the 2011 Irish Gener...
 
Prof. DiAfonso - Elementos da Comunicação e Funções da Linguagem - Questões
Prof. DiAfonso  -  Elementos da Comunicação e Funções da Linguagem - QuestõesProf. DiAfonso  -  Elementos da Comunicação e Funções da Linguagem - Questões
Prof. DiAfonso - Elementos da Comunicação e Funções da Linguagem - Questões
 
Visualizing the Area of a Trapezoid Formula - Deriving the Algebraic Formula
Visualizing the Area of a Trapezoid Formula - Deriving the Algebraic FormulaVisualizing the Area of a Trapezoid Formula - Deriving the Algebraic Formula
Visualizing the Area of a Trapezoid Formula - Deriving the Algebraic Formula
 
Augmented Reality: Beyond Usability
Augmented Reality: Beyond UsabilityAugmented Reality: Beyond Usability
Augmented Reality: Beyond Usability
 
CIPR Guide to Social Media Monitoring
CIPR Guide to Social Media MonitoringCIPR Guide to Social Media Monitoring
CIPR Guide to Social Media Monitoring
 
The Transmedia Trip: The Psychology of Multi-Platform Engagement
The Transmedia Trip: The Psychology of Multi-Platform EngagementThe Transmedia Trip: The Psychology of Multi-Platform Engagement
The Transmedia Trip: The Psychology of Multi-Platform Engagement
 
Transmedia Storytelling for Social Impact
Transmedia Storytelling for Social ImpactTransmedia Storytelling for Social Impact
Transmedia Storytelling for Social Impact
 
The Psychology of Social Media (Mozcon 2015)
The Psychology of Social Media (Mozcon 2015)The Psychology of Social Media (Mozcon 2015)
The Psychology of Social Media (Mozcon 2015)
 

Similar to In defence of the human factor

Human Error in Cyber Security
Human Error in Cyber SecurityHuman Error in Cyber Security
Human Error in Cyber SecurityAntti Ollila
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING ijmvsc
 
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
Running Head INFORMATION SECURITY VULNERABILITY     2.docxRunning Head INFORMATION SECURITY VULNERABILITY     2.docx
Running Head INFORMATION SECURITY VULNERABILITY 2.docxcharisellington63520
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat PrognosisFireEye, Inc.
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONClaire Webber
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2Claire Webber
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threatmilliemill
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxbartholomeocoombs
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxoreo10
 

Similar to In defence of the human factor (20)

Human Error in Cyber Security
Human Error in Cyber SecurityHuman Error in Cyber Security
Human Error in Cyber Security
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
 
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
Running Head INFORMATION SECURITY VULNERABILITY     2.docxRunning Head INFORMATION SECURITY VULNERABILITY     2.docx
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
 
Atos wp-cyberrisks
Atos wp-cyberrisksAtos wp-cyberrisks
Atos wp-cyberrisks
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Senior Seminar Paper
Senior Seminar PaperSenior Seminar Paper
Senior Seminar Paper
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
 

Recently uploaded

Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 

Recently uploaded (20)

Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 

In defence of the human factor

  • 1. IN DEFENCE OF THE HUMAN FACTOR Dr Ciarán Mc Mahon Tivi Digital & Cyber Security, Scandic Park, Helsinki, 24.11.2016
  • 2. Introduction • Today’s talk • The so-called ‘weakest’ so-called ‘link’ • The ETTO principle • Everything is broken • Victim-blaming • Building a positive cyber security culture
  • 3. About me Dr Ciarán Mc Mahon is a director of the Institute of Cyber Security and an award-winning academic psychologist from Ireland. A former Government of Ireland Scholar, he has published research on the history of psychological language, the psychology of social media, digital wellness and the social impact of cybercrime. Ciarán has worked at a number of third level institutions, and is currently an occasional lecturer at University College Dublin. Ciarán also has extensive media experience and regularly contributes on topics relating to the human aspects of information technology to national and international outlets including Sky News, BBC Radio London, USA Today, Fortune Magazine, and The Guardian.
  • 4. The Institute of Cyber Security aims to help companies and organisations develop the most resilient cyber security culture possible.
  • 5. It all started with Bruce Schneier (2000)
  • 6. It all started with Bruce Schneier (2000)
  • 7. and continued with Kevin Mitnick (2002)
  • 8. and continued with Kevin Mitnick (2002)
  • 9.
  • 10. AS A HUMAN BEING, I RESENT THIS!
  • 11. What about the other links in the security chain? Are they really stronger, and more secure?
  • 12. ‘Everything is broken’ Quinn Norton It’s hard to explain to regular people how much technology barely works, how much the infrastructure of our lives is held together by the IT equivalent of baling wire. Computers, and computing, are broken.
  • 13. Update of the art Recent patches o 16 updates of iOS in the last year o 3 Flash updates in a single month o How quickly did Windows 8 become Windows 8.1?
  • 14. Update of the art Recent patches o Only 7.5% of all Android devices are running its most secure operating system o This is currently being investigated by the US Federal Trade Commission
  • 15. ‘Another flaw in the human character is that everybody wants to build and nobody wants to do maintenance’
  • 16. So why are we blaming people for security problems, when the technology is falling apart?
  • 17. Acceptable accident causes (Hollnagel & Amalberti, 2001) Accidents are always found to have been o associated with a system structure o which can be reduced within accepted limits of cost and time o conforms to current “norms” for explanations
  • 18. Human error is a meaningless concept Every day the average office worker clicks on hundreds of hyperlinks as part of their job. But one day, they click on the wrong one, and suddenly they’re the cause of malware infection. Hollnagel’s (2006) ETTO principle – ‘efficiency-thoroughness trade-off’ Sometimes things go wrong, sometimes things go right.
  • 19. The flipside o We say that ‘the human factor is the weakest link in cybersecurity’ because it’s a lot easier than tackling the real problem o the fact that IT is falling apart o But that’s not the only reason we shouldn’t say ‘the human factor is the weakest link in cybersecurity’
  • 20. IBM 2015 Cyber Security Intelligence Index
  • 21. But how can you expect your employees to listen to you when you are assume that they are stupid or untrustworthy?
  • 22. But how can you expect your employees to listen to you when you are assume that they are stupid or untrustworthy? WE NEED TO CHANGE HOW WE TALK ABOUT HUMAN FACTORS IN CYBERSECURITY
  • 23. Victim blaming (Cross, 2015) Discourse on online fraud is based on idea of greedy/gullible victims o does not take into account level of deception and sophisticated targeting o humour isolates victims and impacts their ability to warn others
  • 24. Understanding abusive insiders Posey, Bennett, & Roberts (2011) : o employees who do not feel that their organisations trust them will engage in more computer abuse when security measures are brought in
  • 25. Organisational justice and fairness Bulgurcu, Cavusoglu, & Benbasat (2009): o creating a fair environment and ensuring procedural justice in regards to implementing security rules and regulations is the key to effective information security management.
  • 26. Are CISOs their own worst enemy? (Ashenden & Sasse, 2013) CISOs struggle to gain credibility due to: o confusion about their role identity o inability to engage effectively with employees
  • 27. If we want our colleagues, co-workers and corporate level executives to engage with cybersecurity policy, we have to stop seeing them as the weakest link. We have to start engaging with them, trusting them, and educating them. It’s that simple.
  • 28. Thank you. Email info@instituteofcybersecurity.com Phone(IRE) +353 1 5137093 Phone(UK) +44 203 8085226 Address Unit 1, 77 Sir John Rogerson’s Quay, Dublin 2, Ireland For full report, contact ciaran@instituteofcybersecurity.com
  • 29. Studies cited Ashenden, D., & Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy? Computers and Security, 39, 396–405. http://doi.org/10.1016/j.cose.2013.09.004 Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2009). Roles of information security awareness and perceived fairness in information security policy compliance. 15th Americas Conference on Information Systems 2009, AMCIS 2009, 5, 3269–3277. Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204. http://doi.org/10.1177/0269758015571471 Hollnagel, E. (2009). The ETTO Principle: Why things that go right sometimes go wrong. Farnham, UK: Ashgate. Hollnagel, E., & Amalberti, R. (2001). The emperor’s new clothes: Or whatever happened to “human error”? 4th International Workshop on Human Error, Safety and Systems Development, (April), 1–18. Mitnick, K. D., & Simon, W. L. (2002). The art of deception: Controlling the human element of security. Indianapolis, IN: John Wiley & Sons Posey, C., Bennett, R. J., & Roberts, T. L. (2011). Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes. Computers and Security, 30(6-7), 486–497. http://doi.org/10.1016/j.cose.2011.05.002
  • 30. Other sources Goodin, D. (2016, May 10). Feds probe mobile phone industry over the sad state of security updates. Ars Technica http://arstechnica.com/security/2016/05/feds-probe-mobile-industrys-security-update-practices/ IBM (2015). IBM 2015 Cyber Security Intelligence Index. http://www-01.ibm.com/common/ssi/cgi- bin/ssialias?subtype=WH&infotype=SA&htmlfid=SEW03073USEN&attachment=SEW03073USEN.PDF Lonergan, K. (2015, June 30). The human factor: top tips to strengthen the weakest link in the information security chain. http://www.information- age.com/technology/security/123459735/human-factor-top-tips-strengthen-weakest-link-information-security-chain Meetup.com (2016, April 7). Human Factors in (Cyber) Security: Exploiting the Weakest Link? http://www.meetup.com/French-IT-Group- Australia-Asia/events/230137510/ Norton, Q. (2014, May 20). 'Everything is broken'. The Message (Medium). https://medium.com/message/everything-is-broken- 81e5f33a24e1#.sc7pf19g3 SANS Institute (2001). The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem. https://www.sans.org/reading-room/whitepapers/vpns/weakest-link-human-factor-lessons-learned-german-wwii-enigma-cryptosystem- 738 Schneier, B. (2000). Secrets and lies: Digital security in a networked world. New York: John Wiley & Sons. Singer, P.W. & Friedman, A. (2014). Cybersecurity: What Everyone Needs to Know. Oxford: OUP. https://books.google.ie/books?id=9VDSAQAAQBAJ&dq Vishwanath, A. (2016, May 5). Cybersecurity’s weakest link: humans. The Conversation. https://theconversation.com/cybersecuritys-weakest- link-humans-57455 Wright, A. (2016, April 13). Humans in cyber security – the weakest link. https://www.itgovernance.co.uk/blog/humans-in-cyber-security-the- weakest-link/

Editor's Notes

  1. Source:
  2. Image: gratisography.com Quote: attributed to Kurt Vonnegut
  3. Source:
  4. Image: picjumbo.com
  5. Image: https://commons.wikimedia.org/wiki/File:Artists-impressions-of-Lady-Justice,_(statue_on_the_Old_Bailey,_London).png
  6. Image: gratisography.com